A Greater Boston RIG project
The PACT (Private Automated Contact Tracing) protocol is a simple, decentralized approach to using smartphones for contact tracing based on Bluetooth proximity. Users of this scheme do not reveal anything about themselves, unless they volunteer to do so. In particular, users can volunteer to donate their private data to a (trusted) health authority, who can then use this data to further control the spread of the virus, but this is discretionary to the users.
Security, Privacy Cryptography
Enterprise IT is not structured to have the time and money to invest in far-reaching and forward-looking security threats and solutions. Academic and government research in these areas thrive, but does not easily find its way into industry. Red Hat’s open source approach allows researchers to share their work immediately and have it reviewed by thousands of security experts. This review further hardens the work and allows it to be put to use more quickly and more broadly so research and inventions in cryptography, privacy and cybersecurity have immediate impact.
|Accelerating Microarchitectural Security Research||We are working on processes and tooling to lower the barrier to entry into the field and accelerate attack research and mitigation across academia and industry.||Security, Privacy, Cryptography||Brno||Graz University of Technology||brno||tu-graz|
|Authentication in public open-source repositories||This project focuses on user authentication in public repositories containing open-source projects, which are then used by commercial companies (e.g. Red Hat) as a source for their internally maintained repositories.||Security, Privacy, Cryptography||Brno||Masaryk University||brno||masaryk-university|
|PACT: Private Automated Contact Tracing||Security, Privacy, Cryptography||Greater Boston||Boston University||greater-boston||boston-university|
|OpenInfra Labs||OpenInfra Labs is an OpenStack Foundation project connecting open source projects to production to advance …||AI-ML, Cloud-DS, Hardware and the OS, Security, Privacy, Cryptography, Testing and Ops||Boston University, Northeastern University, UMass Amherst||boston-university northeastern-university umass-amherst|
|Elastic Secure Infrastructure||This project encompasses work in several areas to design, build and evaluate secure bare-metal elastic infrastructure for data centers.||Cloud-DS, Security, Privacy, Cryptography, Testing and Ops||Greater Boston||Boston University||greater-boston||boston-university|
|Open Cloud Testbed||The Open Cloud Testbed project will build and support a testbed for research and experimentation into new cloud platforms – the underlying software which provides cloud services to applications. Testbeds such as OCT are critical for enabling research into new cloud technologies – research that requires experiments which potentially change …||AI-ML, Cloud-DS, Hardware and the OS, Security, Privacy, Cryptography, Testing and Ops||Greater Boston||Boston University, Northeastern University, UMass Amherst||greater-boston||boston-university northeastern-university umass-amherst|
|Implementing Secure Multi-Party Computing||Secure Multiparty Computation (MPC) is a cryptographic primitive that allows several parties to jointly and privately compute desired functions over secret data. Building and deploying practical MPC applications faces several obstacles, including performance overhead, complicated deployment and setup procedures, and adoption of MPC protocols into modern software stacks. MPC applications …||Cloud-DS, Security, Privacy, Cryptography||Greater Boston||Boston University||greater-boston||boston-university|
|Usable Security for Developers||This project focuses on the cryptographic APIs with respect to their developer usability. Such APIs are notoriously complex and prone to usage errors – our goal is to analyze their (in)correct usage and propose precautions and guidelines to achieve better usability and security.||Security, Privacy, Cryptography||Brno||Masaryk University||brno||masaryk-university|
|Fuzzing Device Emulation in QEMU||Hypervisors—the software that allows a computer to simulate multiple virtual computers—form the backbone of cloud computing. Because they are both ubiquitous and essential, they are security-critical applications that make attractive targets for potential attackers.||Hardware and the OS, Security, Privacy, Cryptography, Testing and Ops||Greater Boston||Boston University||greater-boston||boston-university|
|FPGAs in Large-Scale Computer Systems||We will highlight many ways to deploy FPGAs in a data center node, such as traditional back-end accelerators, tightly coupled off-load processors, Smart NICs, Bump-in-the-Wire, MPC accelerators and even FPGAs in the router itself. We will also discuss our efforts to make these devices accessible globally accessible, through deeper integration …||Cloud-DS, Hardware and the OS, Security, Privacy, Cryptography||Greater Boston||Boston University||greater-boston||boston-university|